CDM Media | CSCO Chicago Summit - TBD 2023

CSCO Chicago Summit

CDM Media | CSCO Chicago Summit

TBD 2023

Venue TBD

 
 

Speakers

Past and Present CDM Media Summit Speakers

Sergio Borger

Accelerating Technology to Connect Millennials with Community, Convenience and Inspiration View details

Sergio Borger
Innovation Program Director, IBM Global Technology Services
IBM
Charlotte Wang

Empower Business Transformation with a Well-Managed Hybrid Cloud View details

Charlotte Wang
IBM Distinguished Engineer
IBM
Flavio Aggio

COVID-19 Cybersecurity attacks View details

Flavio Aggio
Chief Information Security Officer
World Health Organization
Lou Najdzin

Digital Transformation - Architecting Your Digital Edge View details

Lou Najdzin
Senior Director, Vertical Marketing
Equinix
Paige Adams

The Next Phase of Digital Transformation View details

Paige Adams
CISO Group
Zurich Insurance Group
Matt Smith

Minimizing the Detection to Recovery Timeframe View details

Matt Smith
Senior Solutions Architect
eSentire
Eddie Curl

Enabling a Business First Network: Moving from Software-Defined to a Self-Driving Wide Area Network View details

Eddie Curl
Enterprise Account Manager
Silver Peak Systems
Nick McKenzie

The CISO's Guide to Crowdsourced Security and CCT View details

Nick McKenzie
Chief Information Security Officer in G&A : Cybersecurity
Bugcrowd
Chris Eves

Enhance Zero Trust with AD Security View details

Chris Eves
Enterprise Sales Engineer
Tenable
Sanjeevan Srikrishnan

Government & Enterprise Industry: Performance, Security and Compliancy in the Digital Era View details

Sanjeevan Srikrishnan
Senior Global Solutions Architect
Equinix
Ira Ham

Board Reports View details

Ira Ham
Vice President Global Chief Information Security Officer
Orora Group
Ethan Pack

Enterprise Architecture & Culture: Two Key Ingredients for Digital Transformation Success View details

Ethan Pack
VP, Enterprise Architecture
Texas Dow Employees Credit Union
 

To see the full list of delegates, please sponsor or attend

 
 

Agenda

Registration & Networking Breakfast

8:30 AM - 9:00 AM

Welcome Address

9:00 AM - 9:10 AM

Keynote: Edward Wagoner

9:10 AM - 9:40 AM

2022 Focus: CIOs and CISOs as Transformation Leaders

Successful IT and security leaders in the new world focus on the people, but why didn't they always? Leaders have to become the trusted advisor to the wider executive. It's important for IT and security executives to be associated with transformation and collaboration as much as they are with the tin, the wires and the power point projector. 

 In this session we'll look at: 

 

  • IT and security executives place on the board
  •  How to build the team as a transformation team
  • Leadership should be fluent in new technology leaders, why? 
  • What do you need to lead a digital transformation team

Edward Wagoner

Executive Director & Chief Information Officer (Digital)

JLL

Thought Leadership

9:45 AM - 10:10 AM

Addressing the Technology Skills Gap: Reskilling and Upskilling

In the digital age, technology teams are only as successful as their skills are relevant. Companies are under pressure to become more agile, protect against rising security threats, and continuously deliver innovations to the market. This begs the question - how do you keep up with the constant pace of change in technology? 

Join this session to hear how leaders must see technology skills as a strategic and essential part of successful digital transformation, as well as how they can gain the clarity they need to lead, and the skills they need to move faster.

Break

10:10 AM - 10:20 AM

CISO: Matt Morton

10:20 AM - 10:45 AM
Think Tank session with Matt Morton

Matt Morton

CIO: Lessons Learned Leading a Company Through An IPO

10:20 AM - 10:45 AM

Lessons learned on my personal journey leading my company through an IPO and adding responsibility

Rita Fisher

Executive Boardroom

10:50 AM - 11:15 AM

Faster Ransomware Remediation through Better Data Insight

Join this session to learn how to leverage Machine Learning and Natural Language Processing to automatically discover and classify sensitive data. By more clearly understanding the value of data you can better prioritize ransomware recovery operations, see how anomaly detection helps you understand the full impact of ransomware in your environment and how you can use our platform to quickly, and surgically recover. 

Data is arguably one of the most critical business assets today, cyber criminals have caught on to this, a ransomware remediation strategy will greatly improve your organization resilience.

CIO: Smart City, Innovation and Security can Work for You

11:20 AM - 11:45 AM
What’s a smart city? Cities earn the label “smart” when they use three things – information, communication, and technology – to make a city run better, make it safer, more connected and prosperous. The main goal of a smart city is to optimize city functions and promote economic growth while also improving the quality of life for citizens by using smart technologies and data analysis. The security goals of a smart city—confidentiality, integrity, availability, safety, and resiliency—should be grounded on both the objectives of traditional IT (to secure data) as well as those of OT (to ensure safety and resiliency of systems and processes). Takeaway: How The City of Aurora used its agility to be in the forefront of Smart City Transformation

Michael Pegues

Chief Information Officer | Information Technology Division

City of Aurora, IL

CISO: The Cybersecurity Hiring Challenge: Solve the Mismatch

11:20 AM - 11:45 AM
There are nearly 600,000 open cybersecurity positions in the United States. HR departments have greatly inflated expectations of candidates for cybersecurity roles. Newly qualified cybersecurity professionals get one rejection letter after another. How can we solve this mismatch? How can we know who we can trust in entry-level positions, and what positions calling for five years experience and a CISSP could actually be filled by a qualified entry-level candidate?

Ray Trygstad

Executive Boardroom-Rise of machines: The new identity threat

11:50 AM - 12:15 PM

The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – TLS, SSH, and code signing keys and certificates – that control encryption, authentication, and code execution. However, compromise, misuse, and fraud of machine identities are prime attack vectors for hackers. Errors are creating debilitating outages and resulting in millions of dollars in lost revenue and impacted customer satisfaction and trust. For all these reasons and more, Gartner has named Machine Identity Management a top cyber trend for 2021.

 

Attend this session to learn:

· Errors, outages, and incidents happen every day when machine identities fail

· The top machine identity attacks targeting your organisation and software supply chain

· How to use the machine identity threat model built on standard ATTACK

· Three things your organisation can do today to stay #fastsecure with Machine Identity Management

 

Kevin Bocek

VP, Security Strategy & Threat Intelligence

Venafi

CIO Think Tank: Yael Gomez

12:20 PM - 12:45 PM

The miniaturization of electronic gadgets, the IoT (Internet of Things) and the economization of medical tech production has enabled consumers to monitor their physiological parameters, take actionable decisions, and partner with their caregivers to reap the benefits of precision, preventative, and economical health care. Patients can now buy and use basic physiological and metabolic monitors at the local pharmacy store at an affordable price. Clinicians can monitor them in real time using bot-based AI and RPA processes. But how secure is the information and are you prime for a ransomware attack.

Yael Gomez

CISO: Richard Rushing

12:20 PM - 12:45 PM
Join Richard Rushing in this CISO Think Tank.

Richard Rushing

Networking Lunch

12:50 PM - 1:50 PM

CISO: What Good Looks Like

1:55 PM - 2:20 PM
  • Working with vendors can be pleasant, mutually beneficial, and accomplished well without significant time commitment
  • Vendors offer a unique and powerful perspective that we should leverage
  • As CISOs, we can enable a more efficient market by promoting and ignoring vendors as appropriate

Brent Deterding

CIO: Jim Ferolo

1:55 PM - 2:20 PM
Join Jim Ferolo for this CIO Think Tank session.

Jim Ferolo

Thought Leadership

2:25 PM - 2:50 PM

Is Digital Transformation Driving the Need for DevSecOps?

There are over 20 million developers working for Enterprise organizations across the globe. The universal desire for faster innovation and Digital Transformation has led to DevOps empowered developers demanding efficient reuse of code, which in turn has led to a growing dependence on open source and third-party software libraries. This velocity means applications are developed faster but it also introduces new security risks. 

Join us as we discuss how the modern software supply chain and the drive for digital innovation is putting organizations at risk. And whether it is time to empower every developer to be a DevSecOps expert?

CIO: Deepkia DiGiovine

2:55 PM - 3:20 PM

Understanding Cyberattack Risk in Your Organization: Time to Re-evaluate the Fundamentals?

  • How can organizations ensure that budget spent on security solutions are in fact reducing the company's overall risk profile?
  • Has your company made any structural changes to the organization to ensure that IT leaders who manage identity and access control are contributing to discussions with executives about managing the risk of cyberattacks?
  • Given that many cyberattacks start by exploiting vulnerabilities in IT systems, how has your company pivoted to ensure that foundational security practices are closing some of the most common gaps?

Deepkia DiGiovine

CISO: Human Success Factors in Information Security

2:55 PM - 3:20 PM
Join Todd Covey as he speaks on Human Success Factors in Information Security.

Todd Covert

CISO

Allstate

Executive Boardroom

3:25 PM - 3:50 PM

Prevent Outages Across Your Organization: A guide to how predictive analytics can influence postitive business outcomes

As the pressure to be 'on' increases, so does data complexity - yet many organizations still rely on traditonal legacy IT solutions. During this session, we will explore how predictive analytics supports a pro-active approach to meeting the demands of customers, employees, and the business. 

Is it possible to predict and prevent issues before interruptions or outages occur?

- 5 steps to forecast with confidence:

- learn how predictive analytics and machine learning can help your organization cut costs, streamline operations, and raise productivity

- Learn how you can you successfully imbed tech in your current application

PM Break

3:50 PM - 4:00 PM

CIO: Augustus Oakes

4:00 PM - 4:25 PM
Join Augustus Oakes for this CIO Think Tank.

Augustus Oakes

CISO: Alyssa Miller

4:00 PM - 4:25 PM
Join Alyssa Miller for a CISO Think Tank.

Alyssa Miller

Closing Panel

4:30 PM - 5:15 PM

Closing Remarks

5:15 PM - 5:25 PM

Summit Happy Hour

5:30 PM - 6:30 PM
 
 

Governing Board

 

Location

 

Exclusive Technology Conferences Held at Extraordinary Locations

CDM Media summits are held exclusively at five-star resorts across the world. Our executive conferences are designed to put our attendees at ease, and make business seem more like pleasure. Our events are designed to get you out of the office and offer the opportunity to focus your complete attention to the critical topics highlighted by the summit agenda. From breathtaking views to superb dining experiences throughout the conference, each attendee is treated to an experience sure to stimulate informal business discussions in an environment that is unmatched.